0% found this document useful (0 votes)
244 views3 pages

Be - Computer Engineering - Semester 5 - 2022 - May - Computer Network and Security Cns Pattern 2019

This document contains 8 questions regarding computer network and security. It covers topics such as distance vector routing, IPv4 addressing, ARP, network address translation, TCP, UDP, sockets, HTTP, DHCP, and email protocols. The questions are split into multiple parts and include explaining concepts, determining appropriate protocols, analyzing packet headers, and describing processes.

Uploaded by

Rohan Balsaraf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
244 views3 pages

Be - Computer Engineering - Semester 5 - 2022 - May - Computer Network and Security Cns Pattern 2019

This document contains 8 questions regarding computer network and security. It covers topics such as distance vector routing, IPv4 addressing, ARP, network address translation, TCP, UDP, sockets, HTTP, DHCP, and email protocols. The questions are split into multiple parts and include explaining concepts, determining appropriate protocols, analyzing packet headers, and describing processes.

Uploaded by

Rohan Balsaraf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Total No. of Questions : 8] SEAT No.

8
23
P808 [Total No. of Pages : 3

ic-
[5870] - 1128

tat
T.E. (Computer)

6s
COMPUTER NETWORK AND SECURITY

1:5
(2019 Pattern) (Semester - I) (310244)

02 91
8:5
Time : 2½ Hours] [Max. Marks : 70

0
20
1/0 13
Instructions to the candidates:
1) Attempt Q1, or Q.2, Q.3 or Q.4, Q.5or Q.6, Q.7 or Q.8.
0
2) Neat diagrams must be drawn wherver necessary.
7/2
.23 GP

3) Figures to the right indicate full marks.


4) Use of Calculator is allowed.
E
82

5) Assume suitable data is necessary.

8
C

23
ic-
16

Q1) a) Explain distance vector routing algorithm. [6]

tat
8.2

6s
b) A host was given the 192. 168.2.64 /25 IP address, indicate: [6]
.24

1:5
i) Net mask of the network in dotted decimal notation.
91
49

8:5
ii) The network address to which the host belongs.
30

iii) The network broadcast address to which the host belongs.


20
01

iv) The total number of hosts available in the network.


02
7/2

c) Explain IPv4 header format in detail [6]


GP
1/0

OR
CE
82

Q2) a) What is ARP? How it works? [6]

8
23
.23

b) Suppose a router has built up the routing table as shown in the following
table. The router can deliver packets directly over interfaces eth0 and ic-
16

tat
eth1, or it can forward packets to other routers in the table. [6]
8.2

6s

Destination Netmask Gateway


.24

1:5
91

156.26.10.0 255.255.255.192 Eth0


49

8:5
30

156.26.10.128 255.255.255.128 Eth1


20
01

156.26.0.0 255.255.0.0 156.26.10.1


02
7/2

0.0.0.0 0.0.0.0 156.10.1.30


GP
1/0

Describe what the router does with a packet addressed to each of the
CE
82

following destinations
.23

i) 156.26.10.66
16

ii) 156.26.10.226
8.2

iii) 168.130.12.27
.24

c) Explain Network Address Translation (NAT) process. [6]


49

[5870] - 1128 1
P.T.O.
Q3) a) For each of the following applications, determine whether TCP or UDP

8
23
is used as the transport layer protocol and justify the reason(s) for your

ic-
choice. [5]

tat
i) File Transfer

6s
ii) Watching a real time streamed video

1:5
02 91
iii) Web browsing

8:5
iv) A Voice over IP (VoIP) telephone conversation.

0
20
1/0 13
v) YouTube video
b) Explain TCP state transition diagram? [6]
0
7/2
.23 GP

c) Define Socket? Explain Socket primitives at client and server side for
TCP communication with diagram. [6]
E
82

8
C

23
OR

ic-
16

Q4) a) Explain TCP connection establishment process with suitable diagram.[5]

tat
8.2

6s
b) What causes silly window syndrome? How is avoided? Explain. [6]
.24

1:5
c) Following is a dump of UDP header in Hexadecimal format [6]
91
49

8:5
06 32 00 0D 00 1C E2 17
30
20

i) What is source port number?


01
02

ii) What is destination port number?


7/2

iii) What is total length of the user datagram?


GP
1/0

iv) What is the length of the data?


CE
82

v) Is packet directed from a client to server or vice versa?

8
23
.23

vi) What is the client process?


ic-
16

tat
8.2

Q5) a) What is the difference between persistent & non persistent HTTP? Explain
6s

HTTP Request & Response message format. [6]


.24

1:5
91
49

8:5
30

b) Explain working of DHCP. [6]


20

c) Differentiate between POP & IMAP protocol. [6]


01
02
7/2
GP

OR
1/0
CE

Q6) a) Explain how DNS query resolved? [6]


82

b) Explain FTP w.r.t. control and data connection? Explain any two FTP
.23

commands. [6]
16

c) When web pages containing emails are sent out, they are prefixed by
8.2

MIME Header, why? Explain MIME Header. [6]


.24
49

[5870] - 1128 2
Q7) a) Draw and explain Operational Model of Network Security. [5]

8
23
b) Discuss the working of IPSec? What are the different security services

ic-
offered by IPSec? [6]

tat
6s
c) Differentiate between Active attacks and Passive Attacks. [6]

1:5
02 91
8:5
0
OR

20
1/0 13
0
7/2
.23 GP

Q8) a) List and explain various elements of Information Security. [5]


b) Compare Symmetric Key and Asymmetric key encryption techniques.[6]
E
82

8
C

23
c) Explain Secure Socket Layer handshake Protocol. [6]

ic-
16

tat
8.2

6s
.24

1:5
91
49

8:5
30


20
01
02
7/2
GP
1/0
CE
82

8
23
.23

ic-
16

tat
8.2

6s
.24

1:5
91
49

8:5
30
20
01
02
7/2
GP
1/0
CE
82
.23
16
8.2
.24
49

[5870] - 1128 3

You might also like